Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-2204

Опубликовано: 08 июл. 2013
Источник: ubuntu
Приоритет: medium
CVSS2: 4.3

Описание

moxieplayer.as in Moxiecode moxieplayer, as used in the TinyMCE Media plugin in WordPress before 3.5.2 and other products, does not consider the presence of a # (pound sign) character during extraction of the QUERY_STRING, which allows remote attackers to pass arbitrary parameters to a Flash application, and conduct content-spoofing attacks, via a crafted string after a ? (question mark) character.

РелизСтатусПримечание
devel

not-affected

3.5.2+dfsg-1
esm-apps/xenial

not-affected

3.5.2+dfsg-1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.5.2+dfsg-1]]
lucid

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needs-triage
quantal

ignored

end of life
raring

ignored

end of life
saucy

not-affected

3.5.2+dfsg-1
trusty

not-affected

3.5.2+dfsg-1

Показывать по

4.3 Medium

CVSS2

Связанные уязвимости

nvd
почти 12 лет назад

moxieplayer.as in Moxiecode moxieplayer, as used in the TinyMCE Media plugin in WordPress before 3.5.2 and other products, does not consider the presence of a # (pound sign) character during extraction of the QUERY_STRING, which allows remote attackers to pass arbitrary parameters to a Flash application, and conduct content-spoofing attacks, via a crafted string after a ? (question mark) character.

debian
почти 12 лет назад

moxieplayer.as in Moxiecode moxieplayer, as used in the TinyMCE Media ...

github
около 3 лет назад

moxieplayer.as in Moxiecode moxieplayer, as used in the TinyMCE Media plugin in WordPress before 3.5.2 and other products, does not consider the presence of a # (pound sign) character during extraction of the QUERY_STRING, which allows remote attackers to pass arbitrary parameters to a Flash application, and conduct content-spoofing attacks, via a crafted string after a ? (question mark) character.

4.3 Medium

CVSS2